Skip to content

Commit c8d51ca

Browse files
authored
Merge pull request #3 from MicrosoftDocs/master
sync with master
2 parents 046d989 + 8a8fcc3 commit c8d51ca

File tree

4,388 files changed

+51371
-36547
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,388 files changed

+51371
-36547
lines changed

.openpublishing.redirection.json

Lines changed: 480 additions & 324 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ To set up client credential flow, see [Azure Active Directory v2.0 and the OAuth
120120

121121
#### Web API chains (on-behalf-of flow)
122122

123-
Many architectures include a web API that needs to call another downstream web API, where both are secured by Azure AD B2C. This scenario is common in native clients that have a Web API back-end and calls a Microsoft online service such as the Azure AD Graph API.
123+
Many architectures include a web API that needs to call another downstream web API, where both are secured by Azure AD B2C. This scenario is common in native clients that have a Web API back-end and calls a Microsoft online service such as the Microsoft Graph API or Azure AD Graph API.
124124

125125
This chained web API scenario can be supported by using the OAuth 2.0 JWT bearer credential grant, also known as the on-behalf-of flow. However, the on-behalf-of flow is not currently implemented in the Azure AD B2C.
126126

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -273,11 +273,11 @@ Inspect the `B2CGraphClient.SendGraphPatchRequest()` method for details on how t
273273

274274
### Search users
275275

276-
You can search for users in your B2C tenant in following ways:
276+
You can search for users in your B2C tenant in the following ways:
277277

278278
* Reference the user's **object ID**.
279279
* Reference their sign-in identifer, the `signInNames` property.
280-
* Reference any of the valid OData parameters, e.g. givenName, surname, displayName etc.
280+
* Reference any of the valid OData parameters. For example, 'givenName', 'surname', 'displayName' etc.
281281

282282
Run one of the following commands to search for a user:
283283

articles/active-directory-b2c/active-directory-b2c-quickstarts-desktop-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Quickstart - Set up sign-in for a desktop app using Azure Active Directory B2C
3-
description: Run a sample WPF desktop application that uses Azure Active Directory B2C to provide account sign-in.
3+
description: In this Quickstart, run a sample WPF desktop application that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg

articles/active-directory-b2c/active-directory-b2c-quickstarts-spa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Quickstart - Set up sign-in for a single-page app using Azure Active Directory B2C
3-
description: Run a sample single-page application that uses Azure Active Directory B2C to provide account sign-in.
3+
description: In this Quickstart, run a sample single-page application that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg

articles/active-directory-b2c/active-directory-b2c-quickstarts-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Quickstart - Set up sign in for an ASP.NET application using Azure Active Directory B2C
3-
description: Run a sample ASP.NET web app that uses Azure Active Directory B2C to provide account sign-in.
3+
description: In this Quickstart, run a sample ASP.NET web app that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg

articles/active-directory-b2c/active-directory-b2c-reference-oauth-code.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,7 @@ grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&sco
111111
|{tenant}| Required | Name of your Azure AD B2C tenant|
112112
|{policy}| Required| The user flow that was used to acquire the authorization code. You cannot use a different user flow in this request. |
113113
| client_id |Required |The application ID assigned to your app in the [Azure portal](https://portal.azure.com).|
114+
| client_secret | Yes, in Web Apps | The application secret that was generated in the [Azure portal](https://portal.azure.com/). Client secrets are used in this flow for Web App scenarios, where the client can securely store a client secret. For Native App (public client) scenarios, client secrets cannot be securely stored, and therefore are not used in this call. If you use a client secret, please change it on a periodic basis. |
114115
| grant_type |Required |The type of grant. For the authorization code flow, the grant type must be `authorization_code`. |
115116
| scope |Recommended |A space-separated list of scopes. A single scope value indicates to Azure AD both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app needs a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
116117
| code |Required |The authorization code that you acquired in the first leg of the flow. |
@@ -176,7 +177,7 @@ grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=90
176177
|{tenant}| Required | Name of your Azure AD B2C tenant|
177178
|{policy} |Required |The user flow that was used to acquire the original refresh token. You cannot use a different user flow in this request. |
178179
| client_id |Required |The application ID assigned to your app in the [Azure portal](https://portal.azure.com). |
179-
| client_secret |Required |The client_secret associated to your client_id in the [Azure portal](https://portal.azure.com). |
180+
| client_secret | Yes, in Web Apps | The application secret that was generated in the [Azure portal](https://portal.azure.com/). Client secrets are used in this flow for Web App scenarios, where the client can securely store a client secret. For Native App (public client) scenarios, client secrets cannot be securely stored, and therefore are not used in this call. If you use a client secret, please change it on a periodic basis. |
180181
| grant_type |Required |The type of grant. For this leg of the authorization code flow, the grant type must be `refresh_token`. |
181182
| scope |Recommended |A space-separated list of scopes. A single scope value indicates to Azure AD both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app will need a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
182183
| redirect_uri |Optional |The redirect URI of the application where you received the authorization code. |

articles/active-directory-b2c/active-directory-b2c-tutorials-spa-webapi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Tutorial - Grant access to an ASP.NET Core web API from a single-page application - Azure Active Directory B2C
3-
description: Learn how to use Active Directory B2C to protect a .NET Core web API and call the API from a single-page Node.js application.
3+
description: In this tutorial, learn how to use Active Directory B2C to protect a .NET Core web API and call the API from a single-page Node.js application.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg

articles/active-directory-b2c/active-directory-b2c-tutorials-spa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Enable authentication in a single-page application - Azure Active Directory B2C'
3-
description: Learn how to use Azure Active Directory B2C to provide user login for a single page application (JavaScript).
2+
title: 'Tutorial - Enable authentication in a single-page application - Azure Active Directory B2C'
3+
description: In this tutorial, learn how to use Azure Active Directory B2C to provide user login for a single page application (JavaScript).
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg

articles/active-directory-b2c/active-directory-b2c-ui-customization-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,4 +202,4 @@ In the Modify your sign-up or sign-in custom policy section, you configured the
202202
203203
## Next steps
204204
205-
For more information about UI elements that can be customized, see [reference guide for UI customization for built-in policies](active-directory-b2c-reference-ui-customization.md).
205+
For more information about UI elements that can be customized, see [reference guide for UI customization for user flows](active-directory-b2c-reference-ui-customization.md).

0 commit comments

Comments
 (0)